2. UNISYS CORPORATION
r
En más de 120 países
Más de 23,000 empleados
Casa matriz: Blue Bell, PA (U.S.A.)
Datos de la Capacidad de Trabajo
• Mas de 30 años de experiencia en el desarrollo
de soluciones.
• Mas de 1400, aplicaciones pre-construidas y
modelos de procesos.
• 200 millones de correos de voz alrededor del
mundo.
• 600 aeropuertos
• 22 de los 25 bancos más grandes
• 1.500 agencias de gobiernos
Datos de la Capacidad de Trabajo
• Mas de 30 años de experiencia en el desarrollo
de soluciones.
• Mas de 1400, aplicaciones pre-construidas y
modelos de procesos.
• 200 millones de correos de voz alrededor del
mundo.
• 600 aeropuertos
• 22 de los 25 bancos más grandes
• 1.500 agencias de gobiernos
3. Page 3
Remington e Hijos inctroduce la
primera maquina de escribir al
mercado
Unisys Corporation
…Más de un siglo de historia
1873
Se funda la American Arithmometer Co. para
producir y vender la primera sumadora comercial
inventada por William Burroughs
1886
La American Arithmometer cambia
su nombre a Burroughs Adding
Machine Co.
1905
Se funda la Sperry Gyroscope
Company para producir y vender
equipo de navegación
1910
ENIAC, el primer computador a gran escala
fue desarrollado en la Universidad de
Pennsylvania por los científicos J. Presper
Eckert and John Mauchly
1946
Remington Rand produce el
primer computador orientado a
negocios, llamado UNIVAC, fue el primer
computador usado por la Of. de Impuestos de EEUU
y el primer computador instalado en Japón
1949
Remington Rand adquiere la
Eckert-Mauchly Computer Corp.
1950
Sperry y Remington Rand se fucionan y se
convierten en Sperry Rand
1955
Sperry y Burroughs se fucionan para formar
Unisys Corporation. La fución más grande de la
industria de la tecnología hasta ese momento. El
nombre Unisys fue elegido entre 31,000
propuestas de un concurso promovido entre los
empleados de ambas compañías
1986
4. Unisys en Colombia
En 1952… En Julio de 1952 llegan los directivos de
Burroughs para comenzar a trabajar en el país
con su propia marca.
La firma que representaba a Burroughs en
el país en 1948 era J. Glottman.
La firma cambia su nombre adecuándose a la
fusión que acaba de ocurrir en EEUU, pasando a
llamarse UNISYS.
Desde 1948…
En 1986…
Unisys Corporation toma la desición de fundar
una segunda compañía en Colombia
especializada en servicios de Help Desk y
Soporte en Sitio.
En 2009…
5. Unisys en la Región LACSA.
• Conformada por Colombia, Perú,
Venezuela, Argentina, Chile, Uruguay,
Costa Rica y Puerto Rico.
• + 800 empleados directos.
• + 1700 contratistas.
• Carlos Ferrer – Presidente.
10. Page 10
Vision de UNISYS en Transformacion de Data
Centers: Un viaje a un servicio de TI eficiente y
majeado por el negocio.
Reduced cost
Faster speed
to market
Optimized
operations
Improved service
levels
Business drivers
Current state
Decentralized
Complex
Resource-intensive
Costly
Transformed state
Consolidated
Automated
Efficient
Cost-effective
Data Center Transformation
Data center
planning &
management
Virtualization &
consolidation
Service
management
& operations
Data
management
& storage
Secure cloud & IT outsourcing
Advisory services
IT initiatives
Infrastructure
applications
13. Modelos de Entrega y Servicios
Innovadores
Services Benefits
VOaaS (Virtual Office as a Service)
• Cloud-delivered desktops via subscription
• More secure, reduced risk, continuity
• Disaster recovery option for desktops
• Capital avoidance
• Greater accessibility
UCaaS (Unified Communications as a Service)
• Cloud delivery of multi-tenant collaboration, e-
mail and communication applications via
subscription
• Simplified delivery
• Cost effective
• Scalability
• Reduced operational burden
Application Virtualization Services
• Preparation, sequencing and deployment of
desktop applications for use in a virtual
environment
• Improved application management
• Avoid in-house support
• Simplifies application deployment and
maintenance
Virtual Desktop Services
• Monitoring and management of virtual desktops
including virtual machine preparation, install,
change and update including the creation and
support of pools of virtual desktops and the
association of groups of users
• Avoid in-house support
• Simple extension of conventional services to
virtual deploy
• Simplified management
• Reduced cost
14. Gestion de Digital Allowance:
Flexibilidad y Escogencia del Usuario
Page 14
Services Benefits
Remediation Service
• Enhanced remote personal computer monitoring
and repair tools
• Online and Remote Device Support
• Enhanced user and self support options
• Better end user experience
Managed Digital Allowance
• Online portal with tools for end-user selection
and support of devices for use in the workplace
• Portal with Bookstore
• Flexibility and choice
• Greater user satisfaction
• Improved user productivity
Client-side Virtualization Services
• Monitoring and management of end-user device-
resident virtual desktops
• Portable Virtual Client Service
• Greater device flexibility
• Better end user experience
• Secure deployment
16. 16
Proveemos servicios para el ciclo de
vida de las aplicaciones
Planning
Architecture
Application
Infrastructure
Resources
Secure Business Operations
Application Portfolio
Assessment
Governance Security Assessment
Enterprise Architecture
Application Modernization
TestingApp Development & Systems Integration
Application Management
Application Hosting
Global Solution Centers
Application Management Centers
Low-Cost Labors Coordination
These capabilities will be specialized to support specific Industry Solutions
SOA Enablement
This is not an everyday economic downturn
Excess is out … frugality and cost-efficiency are in
Pendulum has swung from an era of “more” to era of “less”
Can no longer throw more servers, more consultants, more computing power at the problem
Organizations must learn to operate permanently with:
Less budget
Less staff
Less time to get things done
Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check.
Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money.
Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications.
Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process.
IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.]
Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’.
As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new technologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
Opening Dialog (Animated slide): the Unisys vision for Data Center Transformation is based on a Journey toward business driven, efficient IT service delivery
Key Points:
The DCT Vision starts by defining the key business drivers that are essential for organizations to focus on
…
’
Notes to Speaker: each of the following IT Initiative areas will be discussed in additional detail in the next section. If you plan to go into each slide in the next section, you can summarize them here. Otherwise, you may wish to provide more detail of each IT Initiative on this slide
[MOUSE-CLICK] The second part of the DCT Vision defines a collection of IT Initiatives which are instrumental in supporting these business drivers
Utilizes workshops and in-depth analysis to provide our clients strategic guidance on data center transformation initiatives. This can take the form of a strategic IT planning session, where a former CxO will provide feedback on your intiiatives, or a value assessment study which focuses on the financial business case for initiatives you are considering
Data Center Planning and Management: is where we define, design and manage the transition or modernization of critical data center assets
Consolidation and Virtualization: provides proven assessment, design and implementation methods for consolidation & virtualization initiatives
Service Management & Operations: is focused on improving ITSM processes to reduce costs, mitigate risks, improve the quality of IT services: preparing for and implementing infrastructure & process automation initiatives
Storage & Lifecycle Data Management: provides our clients with essential solutions and services for their storage infrastructure, disaster recovery and data protection initiatives
Infrastructure Applications: provides our clients the application infrastructure to support collaboration, communication, and database driven business solutions
Cloud Computing / IT Outsourcing: Delivers “best-fit” sourcing strategies, “no excuses, no surprises” performance and “on time, everywhere” global delivery to optimize operations, control costs, reduce risk and align business with IT goals
[MOUSE-CLICK] the Data Center Transformation Journey will evolve an IT infrastructures from a current state which is often decentralized, complex, resource-intensive and costly, to a future-state which is right-sized (or consolidated), automated, and more efficient and cost-effective.
This DCT journey is similar to the evolution defined by familiar maturity model frameworks, such as Gartner’s Infrastructure and Operations Maturity Model (I&OMM)
<next slide>
+++Backup Data:+++
Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check.
Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money.
Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications.
Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process.
IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.]
Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’.
As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new technologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
EUPS – Core Framework for Managed End-User Experience – Proactive Operations & Engineering
Service Desk - end-user desktop hardware & software support via phone, email, and Unisys Service Portal. Single point of access and control, proactive 24x7 monitoring and escalation, service request and incident logging, and incident resolution
ITIL Processes Involved:
Desk-side Support - Global multi-vendor hardware maintenance and desk-side support including:
Onsite repair & placement maintenance for end-user hardware
Onsite software diagnosis & incident resolution for desktops, laptops, & other PC peripherals
SLA measurements, performance data & reporting
Onsite dispatch for installs, moves, adds, changes, & uninstalls
ITIL Processes Involved:
Desktop Management Services –
Image Management – definition, support and revision of the customer’s image files & standards
Patch Management – distribution & tracking of OS & application patches to managed systems
Asset Life Cycle Tracking – definition, implementation & management client devices throughout their lifecycle
Electronic Software Distribution – managed delivery of software onto devices within the supported environment via electronic means
ITIL Processes Involved: (same as Desk-side Support)
Desktop Application Services—
Application Packaging
Application Catalog Support
Software License Tracking
Virtual Application Preparation
ITIL Processes Involved: (same as Desk-side Support)
Service Request
Incident Management
Problem Management
Knowledge Management
Service Request
Incident Management
Problem Management
Knowledge Management
Asset Tracking
Change management
EUPS – Innovative Delivery Models
VOaaS – “Virtual Office as a Service”
Cloud-delivered desktops via subscription
Virtual Machine IMACDs
Customer Service Interface
UCaaS – “Unified Communications as a Service”
Cloud delivery of multi-tenet collaboration, e-mail and communication applications via subscription
MS Exchange
MS SharePoint
MS Office Communicator
Application Virtualization Services – Preparation, sequencing and deployment of desktop applications for use in a virtual environment
Application Package
Shape and Sequence Service
Virtual Desktop Services - Monitoring and management of virtual desktops including virtual machine preparation, install, change and update including the creation and support of pools of virtual desktops and the association of groups of users
Virtual Machine IMACDs
Session/Broker Management
Pool Creation and Maintenance
Management Center Operation
ITIL Processes Involved:
VOaaS
HCCS
Application Virtualization Serivces
Service Request
Incident Management
Problem Management
Knowledge Management
Change Management
Virtual Desktop Services
All of the above, plus...
Configuration Management
EUPS – Dynamic End Point Provisioning & Support User Flexibility and Choice
Remediation Service
Service Request
Incident Management
Problem Management
Knowledge Management
Managed Digital Allowance
All of the above, plus...
Change Management
Client Side Virtualization Services
All of the above, plus...
Asset Tracking
Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check.
Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money.
Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications.
Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process.
IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.]
Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’.
As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new echnologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.
Application Services provides solutions that cover the entire Software Development Lifecycle and provides the multiple sourcing options for resources to provide these services.
Our services include:
For Planning, we provide services to assess your existing application assets and your application security posture. In addition, we have IT Governance processes and resources that can help you manage through complex situations that your IT organizations may be facing.
For Architecture, we have solutions and SME’s in Enterprise Architecture and SOA Enablement. We leverage our real-world experience in developing mission-critical, production-quality software application to provide this experience to help you solve your architecture problems or help you design and plan your next generation architecture.
For Application, we have a full set of development, implementation and Maintenance services to help you create and manage complex applications.
Application Modernization is comprised of services to help you get the most of your existing legacy investment from knowledge mining business rules to automation-assisted code replatforming
We have decades of experience in Application Development and Systems Integration that can we applied to implement software in a wide range of environments.
Testing is an implementation service that can be delivered as an separate solution for those environments where independence or an efficient resource pool is required.
Application Management includes our range or Application Outsourcing to manage and maintain existing applications in a cost-effective way. This allows our customers to use their resources in other ways than do the day-to-day maintenance of their application assets.
In Infrastructure, we provide Application Hosting services for our clients that don’t want to run, maintain and own the infrastructure that is executing systems that we are involved in providing services for.
For resources, Unisys has a global sourcing pool that we can draw upon to pull the best and most appropriate resources to provide our services.
Wrapping all of this, are our Application Security services that ensure that the operations conducted by the applications we are involved in are secure to provide the best business operations.
Unisys Security Advisory Services works with senior leadership teams to assess the viability of their chosen strategies, and shape their operations to achieve secure operations that support sound governance and growth objectives. Our approach, grounded in our proven implementation experience and leveraging the “best and brightest” partners and most innovative technology delivers solutions and thinking that is both innovative and pragmatic – at a cost that recognizes that security isn’t a blank check.
Unisys Secure Commerce and In Transit Visibility protect assets without (1) sacrificing the cost advantages of sourcing from low-cost countries or (2) compromising the efficient flow of goods, assets, and money.
Identity Solutions - People must be securely identified, verified, and credentialed across a multitude of scenarios (e.g., immigration and border control; identity cards; registered traveler), identity fraud must be detected and prevented; efficiency versus security must be balanced; the latest in biometrics must be included; and privacy concerns must be addressed. Unisys Identity solutions provide citizens, employees, and travelers with the means to identify themselves -- assuredly, conveniently, and effectively -- in a variety of different environments and applications.
Unisys Law Enforcement and Public Safety solutions provide the ability to share critical information at key decision points throughout the justice enterprise. As states/provinces and local governments improve information sharing, law enforcement, corrections, and courts can work more effectively and respond faster to emergencies. Unisys Law Enforcement and Public Safety enables stakeholders to make critical decisions and improve productivity—at every point of the criminal justice process.
IT Security Design & Implementation - [As most of the solutions in this area are ‘primed’ in other focus areas, especially DCT&O, I can’t craft this section until I receive input from the other areas.]
Unisys Location & Perimeter Security & Surveillance Solutions protect life, protect property, protect and preserve forensic evidence, and restore life to normal after an event. Our approach, with roots in the justice world, along with our world class expertise in systems integration, delivers LPSS solutions that are comprehensive, cost effective, and focused on secure ‘business as usual’.
As the threats become more sophisticated and the vulnerabilities more complex and harder to secure, new approaches and new echnologies are needed. Unisys Security Operations Services address these challenges by providing a unique combination of IT security, networking, and management services delivered on a common standards-based infrastructure.